Microsoft Security Bulletins For November 2014

Martin Brinkmann
Nov 11, 2014
Updated • Jan 4, 2018
Companies, Microsoft, Windows Updates
|
17

Welcome to the November 2014 overview of Microsoft Security Bulletins and updates for all company products including client and server Windows operating systems as well as Microsoft Office.

It offers an in-depth analysis of all security and non-security updates that Microsoft has released since October 2014, the last official patch day.

Below you find an executive summary that lists the most important information about this month's patch day, a video summary by Microsoft, the operating system and other product distribution of vulnerabilities and their severity, links to security and non-security products, a deployment guide that suggests an order of deployment, and finally information about downloading and installing the updates on systems.

Executive Summary

  1. Microsoft released a total of 14 bulletins today that correct a total of 33 vulnerabilities and exposures
  2. All versions of Microsoft Windows, client and server, and other Microsoft products such as Internet Explorer or Microsoft Office are affected.
  3. Four of the 14 bulletins have received the highest severity rating of critical.

Video Summary

None yet.

Operating System Distribution

Windows RT is affected the least this month followed by Windows Vista and Windows 7 on the client side. The operating system with the highest accumulated severity rating is Windows 8 (and thus also Windows 8.1) which are affected by a total of nine bulletins of which four have been rated critical.

Windows Server 2012 and 2012 R2 are affected the most on the server side. Both server operating systems are affected by three critical, six important and two moderate bulletins.

  • Windows Vista: 4 critical, 3 important, 2 moderate
  • Windows 7:  4 critical, 3 important, 2 moderate
  • Windows 8: 4 critical, 4 important, 1 moderate
  • Windows 8.1: 4 critical, 4 important, 1 moderate
  • Windows RT: 4 critical, 3 important, 1 moderate
  • Windows RT 8.1:  4 critical, 3 important, 1 moderate
  • Windows Server 2003: 3 critical, 3 important, 3 moderate
  • Windows Server 2008: 3 critical, 5 important, 3 moderate
  • Windows Server 2008 R2: 3 critical, 5 important, 3 moderate
  • Windows Server 2012: 3 critical, 6 important, 2 moderate
  • Windows Server 2012 R2: 3 critical, 6 important, 2 moderate
  • Server Core installation: 3 critical, 4 important, 2 moderate

Other Microsoft Product Distribution

  • Microsoft Office 2007: 1 important, 1 moderate
  • Other Microsoft Office software: 1 important
  • Microsoft SharePoint Server 2010: 1 important
  • Microsoft Exchange Server 2007: 1 important
  • Microsoft Exchange Server 2010: 1 important
  • Microsoft Exchange Server 2013: 1 important

Deployment Guide

  1. MS14-064 Windows OLE Component
  2. MS14-066 SChannel,
  3. MS14-065 Internet Explorer
  4. MS14-069 Office
  5. MS14-067 MSXML
  6. Ms14-073 SharePoint
  7. MS14-078 IME
  8. MS14-071 Windows Audio Service
  9. MS14-070 tcpip.sys
  10. Ms14-072 .NET Framework
  11. MS14-076 IIS
  12. MS14-074 RDP
  13. MS14-077 ADFS
  14. MS14-079 Kernel Mode Drivers win32k.sys

Security Bulletins

  • MS14-064 - Vulnerabilities in Windows OLE Could Allow Remote Code Execution (3011443) - Critical - Remote Code Execution
  • MS14-065 - Cumulative Security Update for Internet Explorer (3003057) - Critical - Remote Code Execution
    MS14-066 - Vulnerability in Schannel Could Allow Remote Code Execution (2992611) - Critical - Remote Code
  • Execution
  • MS14-067 - Vulnerability in XML Core Services Could Allow Remote Code Execution (2993958) - Critical - Remote Code Execution
  • MS14-068 - Release date to be determined
  • MS14-069 - Vulnerabilities in Microsoft Office Could Allow Remote Code Execution (3009710) - Important - Remote Code Execution
  • MS14-070 - Vulnerability in TCP/IP Could Allow Elevation of Privilege (2989935) - Important - Elevation of Privilege
  • MS14-071 - Vulnerability in Windows Audio Service Could Allow Elevation of Privilege (3005607) - Important - Elevation of Privilege
  • MS14-072 - Vulnerability in .NET Framework Could Allow Elevation of Privilege (3005210) - Important - Elevation of Privilege
  • MS14-073 - Vulnerability in Microsoft SharePoint Foundation Could Allow Elevation of Privilege (3000431) - Important - Elevation of Privilege
  • MS14-074 - Vulnerability in Remote Desktop Protocol Could Allow Security Feature Bypass (3003743) - Important - Security Bypass Feature
  • MS14-075 - Release date to be determined
  • MS14-076 - Vulnerability in Internet Information Services (IIS) Could Allow Security Feature Bypass (2982998) - Important - Security Bypass Feature
  • MS14-077 - Vulnerability in Active Directory Federation Services Could Allow Information Disclosure (3003381) - Important - Information Disclosure
  • MS14-078 - Vulnerability in IME (Japanese) Could Allow Elevation of Privilege (3005210) - Moderate - Elevation of Privilege
  • MS14-079 - Vulnerability in Kernel Mode Driver Could Allow Denial of Service (3002885) - Moderate - Denial of Service

Security Advisories

  • Re-released: Update for Vulnerabilities in Adobe Flash Player in Internet Explorer (2755801)

Non-security related updates

  • Update for Windows 7 (KB2952664)
  • Update for Windows 8.1, Windows RT 8.1, Windows 8, and Windows RT (KB2976536)
  • Update for Windows 8.1 and Windows 8 (KB2976978)
  • Update for Windows 7 (KB2977759)
  • Update for Windows 8, Windows RT, and Windows Server 2012 (KB3000853)
  • Update for Windows 8 and Windows RT (KB3003663)
  • Update for Windows 8.1 and Windows RT 8.1 (KB3003667)
  • Update for Windows 8.1 (KB3003727)
  • Update for Windows 7 (KB3004469)
  • Update for Windows 8.1, Windows Server 2012 R2, Windows 8, Windows Server 2012, Windows 7, Windows Server 2008 R2, and Windows Server 2008 (KB3004908)
  • Update for Windows 8.1 and Windows RT 8.1 (KB3006178)
  • Update for Windows 8.1 for x64-based Systems (KB3006958)
  • Update for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 (KB3008188)
  • Update for Windows 8.1, Windows RT 8.1, Windows Server 2012 R2, Windows 8, Windows RT, Windows Server 2012, Windows 7, Windows Server 2008 R2, and Windows Server 2008 (KB3008627)
  • Windows Malicious Software Removal Tool - November 2014 (KB890830)/Windows Malicious Software Removal Tool - November 2014 (KB890830) - Internet Explorer Version
  • Update for Windows 8 and Windows RT (KB3008273)
  • System Update Readiness Tool for Windows 7, Windows Server 2008 R2, Windows Server 2008, and Windows Vista (KB947821) [October 2014]
  • Update for Windows 7 (KB2952664)

How to download and install the November 2014 security updates

windows update november 2014

Most Windows users will receive the update via the operating system's automatic update feature. While that is the case, it is also available for download on Microsoft's Download Center website.

There each patch can be downloaded individually or as a monthly security ISO image which Microsoft releases each month as well.

Updates are usually not picked up right away by the operating system. To check for updates manually, do the following:

  1. Tap on the Windows-key, type Windows Update and select the result from the list displayed to you.
  2. There you need to click on check for updates to run a manual update check.

Additional information

Summary
Microsoft Security Bulletins For November 2014
Article Name
Microsoft Security Bulletins For November 2014
Description
Microsoft released a total of 14 security bulletins in November 2014. The overview provides information about everything there is to know about it.
Author
Advertisement

Tutorials & Tips


Previous Post: «
Next Post: «

Comments

  1. The Dark Lady said on July 9, 2023 at 11:19 am
    Reply

    Martin, I would appreciate that you do not censor this post, as it’s informative writing.

    Onur, there is a misleading statement “[…] GIFs are animated images …”. No, obviously you don’t seem to have take much notice of what you were told back in March regarding; Graphics Interchange Format (GIF).

    For example, https://www.ghacks.net/2023/03/31/whats-gif-explanation-and-how-to-use-it/#comment-4562919 (if you had read my replies within that thread, you might have learnt something useful). I even mentioned, “GIF intrinsically supports animated images (GIF89a)”.

    You linked to said article, [Related: …] within this article, but have somehow failed to take onboard what support you were given by several more knowledgeable people.

    If you used AI to help write this article, it has failed miserably.

  2. KeZa said on August 17, 2023 at 5:58 pm
    Reply

    AI is stupid, and it will not get any better if we really know how this all works. Prove me wrong.. https://www.youtube.com/watch?v=4IYl1sTIOHI

  3. Database failure said on August 18, 2023 at 5:21 pm
    Reply

    Martin, [#comment-4569908] is only meant to be in: [https://www.ghacks.net/2023/07/09/how-to-send-gifs-on-iphone-two-different-ways/]. Whereas it appears duplicated in several recent random low-quality non relevant articles.

    Obviously it [#comment-4569908] was posted: 9 July 2023. Long before this thread even existed… your database is falling over. Those comments are supposed to have unique ID values. It shouldn’t be possible to duplicate the post ID, if the database had referential integrity.

  4. Howard Pearce said on August 25, 2023 at 12:24 pm
    Reply

    Don’t tell me!

    Ghacks wants the state to step in for STATE-MANDATED associations to save jobs!!!

    Bring in the dictatorship!!!

    And screw Rreedom of Association – too radical for Ghacks maybe

  5. Howard Allan Pearce said on September 7, 2023 at 9:13 am
    Reply

    GateKeeper ?

    That’s called “appointing” businesses to do the state’s dirty work!!!!!

    But the article says itself that those appointed were not happy – implying they had not choice!!!!!!

  6. owl said on September 7, 2023 at 9:50 am
    Reply

    @The Dark Lady,
    @KeZa,
    @Database failure,
    @Howard Pearce,
    @Howard Allan Pearce,

    Note: I replaced the quoted URI scheme: https:// with “>>” and posted.

    The current ghacks.net is owned by “Softonic International S.A.” (sold by Martin in October 2019), and due to the fate of M&A, ghacks.net has changed in quality.
    >> ghacks.net/2023/09/02/microsoft-is-removing-wordpad-from-windows/#comment-4573130
    Many Authors of bloggers and advertisers certified by Softonic have joined the site, and the site is full of articles aimed at advertising and clickbait.
    >> ghacks.net/2023/08/31/in-windows-11-the-line-between-legitimate-and-adware-becomes-increasingly-blurred/#comment-4573117
    As it stands, except for articles by Martin Brinkmann, Mike Turcotte, and Ashwin, they are low quality, unhelpful, and even vicious. It is better not to read those articles.
    How to display only articles by a specific author:
    Added line to My filters in uBlock Origin: ghacks.net##.hentry,.home-posts,.home-category-post:not(:has-text(/Martin Brinkmann|Mike Turcotte|Ashwin/))
    >> ghacks.net/2023/09/01/windows-11-development-overview-of-the-august-2023-changes/#comment-4573033

    By the way, if you use an RSS reader, you can track exactly where your comments are (I’m an iPad user, so I use “Feedly Classic”, but for Windows I prefer the desktop app “RSS Guard”).
    RSS Guard: Feed reader which supports RSS/ATOM/JSON and many web-based feed services.
    >> github.com/martinrotter/rssguard#readme

  7. Anonymous said on September 14, 2023 at 6:41 pm
    Reply

    We all live in digital surveillance glass houses under scrutiny of evil people because of people like Musk. It’s only fair that he takes his turn.

  8. Anonymous said on September 18, 2023 at 1:31 pm
    Reply

    “Operating systems will be required to let the user choose the browser, virtual assistant and search engine of their choice. Microsoft cannot force users to use Bing or Edge. Apple will have to open up its iOS operating system to allow third-party app stores, aka allow sideloading of apps. Google, on the other hand, will need to provide users with the ability to uninstall preloaded apps (bloatware) from Android devices. Online services will need to allow users to unsubscribe from their platform easily. Gatekeepers need to provide interoperability with third-parties that offer similar services.”

    Wonderful ! Let’s hope they’ll comply with that law more than they are doing with the GDPR.

Leave a Reply

Check the box to consent to your data being stored in line with the guidelines set out in our privacy policy

We love comments and welcome thoughtful and civilized discussion. Rudeness and personal attacks will not be tolerated. Please stay on-topic.
Please note that your comment may not appear immediately after you post it.